漏洞信息详情

NAI PGP Keyserver Web管理接口验证可绕过漏洞

  • CNNVD编号:CNNVD-200109-134
  • 危害等级: 超危
  • CVE编号: CVE-2001-1252
  • 漏洞类型: 配置错误
  • 发布时间: 2001-09-28
  • 威胁类型: 远程
  • 更新时间: 2006-09-22
  • 厂        商: pgp
  • 漏洞来源: Nobuo Miwa※ snsadv...

漏洞简介

PGP Keyserver是Network Associates的一个商业加密软件包,作为PGP公钥管理系统,提供LDAP特性。 PGP Keyserver存在一个漏洞,远程攻击者可以获得Web管理接口的管理权限。Web接口的管理员一般执行命令是通过如下链接: http://www.example.com/keyserver/cgi-bin/console.exe?page_size=... http://www.example.com/keyserver/cgi-bin/cs.exe?action=... 但是远程用户可以无需验证直接访问这些链接执行命令。恶意用户可以利用这个漏洞替换PGP Keyserver上的PGP密钥、获得系统的一些敏感信息以及对系统的合法用户进行拒绝服务攻击。

漏洞公告

临时解决方法: 如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:

* NAI提供了一个临时解决方法,参见 http://www.pgp.com/support/product-advisories/keyserver.asp

------------------------------------------------

# NT版本修改

------------------------------------------------

1) 找到httpd.conf文件(默认安装在 C:\Program Files\Network Associates\PGP Keyserver\Web\conf)如下小节:

#

# "C:/Program Files/Network Associates/PGP Keyserver/Web/cgi-bin" should be changed to whatever your ScriptAliased

# CGI directory exists, if you have that configured.

#

AllowOverride None

Options None

2) 改变成如下:

#

# "C:/Program Files/Network Associates/PGP Keyserver/Web/cgi-bin" should be changed to whatever your ScriptAliased

# CGI directory exists, if you have that configured.

#

AllowOverride None

Options None

Order allow,deny

require valid-user

AuthType Basic

AuthName "PGP Keyserver Administration"

AuthUserFile "C:/Program Files/Network Associates/PGP Keyserver/Web/.allowed-admin"

3) 重启Web服务器。

------------------------------------------------

SOLARIS版本修改

------------------------------------------------

1) 找到Solaris版本的httpd.conf文件 (默认安装在 /opt/PGPkeysrv/web/conf) 如下小节:

ScriptAlias /keyserver/cgi-bin/ "/opt/PGPkeysrv/web/cgi-bin/"

2) 在后面添加:

AllowOverride None

Options None

Order allow,deny

require valid-user

AuthType Basic

AuthName "protected area"

AuthUserFile /opt/PGPkeysrv/web/.allowed-admin

3) 限制只能从192.168.3网段地址才能访问:

AllowOverride None

Options None

require valid-user

AuthType Basic

AuthName "protected area"

AuthUserFile /opt/PGPkeysrv/web/.allowed-admin

# The default installation requires a login but is otherwise allowed

# from the world. To adjust this policy, read the apache documentation available

# at http://www.apache.org, and remove or comment these lines:

# Order allow,deny

# allow from all

# and uncomment these lines:

Order deny,allow

Deny from all

# and use some variations of some of these lines.

# allow from a particular IP:

# allow from 192.168.3.4

# allow from a particular network:

allow from 192.168.3

# allow from a hostname:

# allow from fredsmachine.yourdomain.com

# allow from your entire domain:

# allow from .yourdomain.com

# allow from your subdomain:

# allow from .infotech.yourdomain.com

4) 添加必要的限制:

Order allow,deny

Allow from all

require valid-user

AuthType Basic

AuthName "PGP Keyserver Administration"

AuthUserFile "/opt/PGPkeysrv/web/.allowed-admin"

# use these lines for open access to directory utility.

# Order allow,deny

# Allow from all

# use these lines for closing access to directory utility:

Order deny,allow

Deny from all

# Use the model above or the Apache docs to add IP or domain-based restrictions.

allow from 192.168.3.4

Web服务器必须重启。 厂商补丁: Network Associates ------------------ 目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://www.pgp.com

参考网址

来源: XF 名称: pgp-keyserver-http-dos(7203) 链接:http://www.iss.net/security_center/static/7203.php 来源: www.pgp.com 链接:http://www.pgp.com/support/product-advisories/keyserver.asp 来源: BID 名称: 3375 链接:http://www.securityfocus.com/bid/3375 来源: OSVDB 名称: 4193 链接:http://www.osvdb.org/4193 来源: OSVDB 名称: 1955 链接:http://www.osvdb.org/1955 来源: BUGTRAQ 名称: 20010928 SNS-43: PGP Keyserver Permissions Misconfiguration 链接:http://archives.neohapsis.com/archives/bugtraq/2001-09/0230.html

补丁

    暂无

漏洞信息快速查询

相关漏洞

更多